US 5150411 A Abstract A secret key generator for a trusted authority means in a cryptographic system comprising means for receiving a publicly-known user identity ID
_{A} for a user A; and further comprising secret key generator means for transforming the publicly-known user identity ID_{A} into secret key s_{A} for the user A with the inverse of the exponentiation functiona that is solved for s
_{A}, where a is a publicly-known base parameter, where m is a publicly-known modulus parameter and m=p_{1} *p_{2} * . . . *p_{r} and where p_{1}, p_{2}, . . . , p_{r} are secret system prime numbers. The inverse of the exponentiation function is infeasible to compute in order to calculate the secret key s_{A} without knowing the prime numbers p_{1}, p_{2}, . . . , p_{r}. The secret key s_{A} enables user A to communicate securely to a user B having publicly-known user identity ID_{B} with a mutual secure cipher key K_{AB}, defined by the equation:K The mutual secure cipher key K
_{AB} is determined without previous interaction with the user B.Claims(32) 1. Secret key generator in a cryptographic system comprising:
means for receiving secret system prime numbers p _{1}, p_{2}. . . _{r}, a publicly-known modulus parameter m, where m=p_{1} * p_{2} * . . . P_{r} and a publicly-known base parameter a;means for receiving a publicly-known user identity ID _{A} suitably transformed from publicly-known user identification information from user A; andsecret key generator means for generating secret key s _{A} for the user A by transforming the publicly-known user identity ID_{A} with the inverse of the exponentiation functiona that is solved for s _{A}, the inverse of the exponentiation function being infeasible to compute without knowing the secret system prime numbers p_{1}, p_{2}, . . . , p_{r}.2. Secret key generator as claimed in claim 1, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in a range of 35 and 150 decimal digits.3. Secret key generator as claimed in claim 1, wherein the number of secret system prime numbers is between 2 and 5.
4. Secret key generator as claimed in claim 1, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 50 and 80 decimal digits, and the number of prime numbers is 3.5. Secret key generator as claimed in claim 1, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 90 and 110 decimal digits, and the number of prime numbers is 2.6. Secret key generator as claimed in claim 1, wherein the secret system prime numbers p
_{i}, for i=1 to r, are in the special form p_{i} -1 having no large prime factors greater than 10^{15}.7. Secret key generator means as claimed in claim 1, wherein the transformation function generating the secret key s
_{A} enables the user A to communicate securely with user B having a publicly-known user identification ID_{B} to generate a mutual secure cipher key K_{AB} determined without interaction with user B.8. Secret key generator means for a trusted authority means in a cryptographic system comprising:
(a) means for receiving secret system prime numbers p _{1}, p_{2}, . . . , p_{r}, publicly-known modulus parameter m where m=p_{1} * p_{2} * . . . * p_{r} and a publicly-known base parameter a, which is a primitive element of given finite fields FG(p_{1}), . . . , GF(p_{r}), and(b) means for receiving publicly-known user identity ID _{A} suitably transformed from user identification information for a user A;(c) secret key generator means for transforming the user identity ID _{A} into a secret key s_{A} for the user A with the inverse of the exponentiation functiona that is solved for s _{A}, the inverse of the exponentiation function being infeasible to compute without knowing the secret system prime numbers p_{1}, p_{2}, . . . , P_{r}, and the secret key s_{A} enabling user A to communicate securely with a user B who has a publicly-known user identity ID_{B} with a mutual secure cipher key K_{AB}, defined by the equation:K the mutual secure cipher key K _{AB} being determined without previous interaction with user B.9. Secret key generator as claimed in claim 8, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in a range of 35 and 150 decimal digits.10. Secret key generator as claimed in claim 8, wherein the number of secret system prime numbers is between 2 and 5.
11. Secret key generator as claimed in claim 8, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 50 and 80 decimal digits, and the number of prime numbers is 3.12. Secret key generator as claimed in claim 8, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 90 and 110 decimal digits, and the number of prime numbers is 2.13. Secret key generator as claimed in claim 8, wherein the secret system prime numbers p
_{i}, for i=1 to r, are in the special form, p_{i} -1 having no large prime factors greater than 10^{15}.14. Trusted authority means in a cryptographic system comprising:
(a) means for suitably transforming publicly-known user identification information for a user A into user identity ID _{A} ;(b) secret key generator means for transforming the user identity ID _{A} into a secret key s_{A} for the user A with the inverse of the exponentiation functiona that is solved for s _{A}, where a is a publicly-known base parameter, where m is a publicly-known modulus parameter and m=p_{1} * p_{2} . . . * p_{r} and where p_{1}, p_{2}, . . . , P_{r} are secret system prime numbers, the inverse of the exponentiation function being infeasible to compute without knowing the secret system prime numbers p_{1}, p_{2}, . . . , p_{r}, and the secret key s_{A} enabling user A to communicate securely with a user B who has a publicly-known user identity ID_{B} with a mutual secure cipher key K_{AB}, defined by the equation:K the mutual secure cipher key K _{AB} being determined without previous interaction with user B.15. Trusted authority means as claimed in claim 14, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in a range of 35 and 150 decimal digits.16. Trusted authority means as claimed in claim 14, wherein the number of secret system prime numbers is between 2 and 5.
17. Trusted authority means as claimed in claim 14, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 50 and 80 decimal digits, and the number of prime numbers is 3.18. Trusted authority means as claimed in claim 14, wherein the secret system prime numbers number p
_{i}, p_{2}, . . . , p_{r} are in the range of 90 and 110 decimal digits, and the number of prime numbers is 2.19. Trusted authority means as claimed in claim 14, wherein the secret system prime numbers p
_{i}, for i=1 to r, are in the special form, p_{i} -1 having no large prime factors greater than 10^{15}.20. Trusted authority means in a cryptographic system comprising:
(a) system parameter generator means for generating secret system prime numbers P _{1}, P_{2}, . . . , P_{r}, a publicly-known system modulus m, where m=P_{1} * P_{2} * . . . * P_{r}, and a publicly-known system base a, which is a primitive element of given finite fields GF(p_{1}), . . . , GF(p_{r});(b) means for receiving publicly-known user identification information from a user A; (c) means for suitably transforming the publicly-known user identification information from a user A into a user identity ID _{A} so that the user identity ID_{A} has a discrete logarithm modulo m for the base a; and(d) secret key generator means for transforming the user identity ID _{A} into a secret key s_{A} for the user A with the inverse of the exponentiation functiona that is solved for s _{A}, the inverse of the exponentiation function being infeasible to compute without knowing the secret system prime numbers p_{1}, p_{2}, . . . , p_{r}, and the secret key s_{A} enabling user A to communicate securely with a user B who has a publicly-known user identity ID_{B} with a mutual secure cipher key K_{AB}, defined by the equation:K the mutual secure cipher key K _{AB} being determined without previous interaction with user B.21. Trusted authority means as claimed in claim 20, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in a range of 35 and 150 decimal digits.22. Trusted authority means as claimed in claim 20, wherein the number of secret system prime numbers is between 2 and 5.
23. Trusted authority means as claimed in claim 20, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 50 and 80 decimal digits, and the number of prime numbers is 3.24. Trusted authority means as claimed in claim 20, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 90 and 110 decimal digits, and the number of prime numbers is 2.25. Trusted authority means as claimed in claim 20, wherein the secret system prime numbers p
_{i}, for i=1 to r, are in the special form, p_{i} -1 having no large prime factors greater than 10^{15}.26. A cipher key generator means in a cryptographic system for generating a secure mutual cipher key enabling a transmitting user T having a publicly-known identity ID
_{r} to communicate securely with a receiving user R having publicly-known identity ID_{r} comprising:(a) transmitting user input means for receiving a secret key s _{T} generated by a secret key generator of a trusted authority with the inverse of the exponentiation functiona that is solved for s _{T}, where a is a publicly-known base parameter, where m is a publicly-known modulus parameter and m=p_{1} * p_{2} * . . . * P_{r} and where p_{1}, p_{2}, . . . , p_{r} are secret system prime numbers, the inverse of the exponentiation function being infeasible to compute in order to calculate the secret key s_{T} without knowing the secret prime numbers p_{1}, p_{2}, . . . , p_{r} ; and(b) transmitting user cipher key generator means for transforming the secret key s _{T} and the receiving user R's publicly-known identity ID_{R} into a mutual secure cipher key K_{TR}, defined by the equation:K the mutual secure cipher key K _{TR} being determined without previous interaction with receiving user R.27. A cipher key generator means as claimed in claim 26, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in a range of 35 and 150 decimal digits.28. A cipher key generator means as claimed in claim 26, wherein the number of secret system prime numbers is between 2 and 5.
29. A cipher key generator means as claimed in claim 26, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 50 and 80 decimal digits, and the number of prime numbers is 3.30. A cipher key generator means as claimed in claim 26, wherein the secret system prime numbers p
_{1}, p_{2}, . . . , p_{r} are in the range of 90 and 110 decimal digits, and the number of prime numbers is 2.31. A cipher key generator means as claimed in claim 26, wherein the secret system prime numbers p
_{i}, for i=1 to r, are in the special form, p_{i} -1 having no large prime factors greater than 10^{15}.32. A cipher key generator means as claimed in claim 26, which further comprises identification protocol means, including a first means for choosing a random number r and sending a number a
^{r} (mod m) to receiving user R, a second means for receiving a binary variable b in the form of "0" or "1" from user R, and a third means for sending back to the user R the random number r if variable b equals "0", or sending the number r plus secret key s_{T} if variable b equals "1", thereby concealing the value of the secret key s_{T} while allowing the user R to check the equality of the equation: a^{r+s}.sbsp.T ≡a^{r} ·(ID_{T})^{2} (mod m) to confirm user T's identity.Description This invention relates to cryptographic systems, and more particularly to cryptographic systems using identity-based information as public keys. Cryptographic systems are widely used to ensure the privacy and authenticity of messages transmitted over public communication channels, such as telephone lines. One type of cryptographic system, generally known as a privacy cryptosystem, prevents extraction of information by unauthorized parties from messages transmitted over such an insecure communication channel, thus assuring a sender that a message being sent is read only by an intended receiver. Another type of cryptographic system, generally known as an authentication cryptosystem, prevents undetected alteration or unauthorized injection of messages into the insecure communication channel, assuring an intended receiver of the authenticity of an intended message. Cryptographic systems are heavily relied on in military, diplomatic and business communications of information, including voice, picture and text data. A conventional type of privacy cryptosystem allows a sender to transmit a plaintext message P over, for instance, a telephone line to a receiver. At the sender's site, an encryption device encodes with a secret key the plaintext message P into a ciphertext message C, which is then transmitted. At the receiver's site, a decryption device decodes the ciphertext message C with the secret key back into the plaintext message P. The secret key is one known only to the two conversers. Given this secret key, the transformations on the message can be performed, without the secret key the transformations cannot, even with the most powerful computers known to mankind. Thus for an enemy eavesdropper, who wants to decipher the message and yet is assumed to have no information about the secret key, it is infeasible to determine the plaintext message P corresponding to a given ciphertext, or to determine the secret key even if he were given matching plaintext/ciphertext pairs. But one problem with this system is that it requires the distribution of secret keys to the communicating parties. This is often done over a secure channel such as priority mail, or in advance by a trusted courier, which can be expensive, or impossible, as in many military applications. U.S. Pat. No. 4,200,770, issued to Diffe and Hellman, teaches a well-known public key distribution system, allowing two parties to agree on a secret key even if they do not share any secret initially and even if an enemy eavesdropper can listen to their entire communication over the insecure communication channel. In order to do so, both parties independently and randomly select a secret key which they store in their system secretly. Each party then transforms their secret key into a corresponding public key so it is infeasible for an enemy to reverse the transformation process to find out their respective secret keys. The public keys are then exchanged over the insecure communication channel. (Alternatively, a public directory service provides a listing of all the previously registered public keys, again accessed over a channel that is assumed to be insecure.) In order to generate a mutual secure cipher key each converser performs a transformation involving its own secret key and the other party's public key. At the sender's site, the encryption device encodes with the mutual secure cipher key a plaintext message P into a ciphertext message C, which is then transmitted. At the receiver's site, the decryption device decodes the ciphertext message C with the mutual secure cipher key back into the plaintext message P. Unlike the previous system described, the public key is readily available to all users of the communication channel. The system has the important property that even though the enemy eavesdropper knows a user's public key on the communication channel, it is infeasible to generate the user's secret key. Moreover, even if the enemy eavesdropper knows the sender's public key and the receiver's public key, it is still infeasible to generate the mutual secure cipher key. See also Diffie and Hellman, New Directions In Cryptography, IEEE Trans. on Inform. Theory, volume IT-22, November 1976. However, a disadvantage of the Diffe-Hellman system is that the enemy eavesdropper may impersonate a given user by claiming that the enemy eavesdropper's public key is the user's public key. Thus the public keys of any given user must be capable of being verified or authenticated by a communicating party. This is known in the art as the authenticity problem. As one way of identifying public keys, a trusted authority digitally signs user public keys, so that after exchanging the public keys, the communicating parties can check the signature and verify the authenticity of the communicating parties public key. See Rivest, Shamir and Adleman, A Method For Obtaining Digital Signatures And Public-key Cryptosystems, Communications of the ACM, volume 21 (1978). This system although solving the authenticity problem, still suffers from the disadvantage of being interactive, i.e. users must exchange public information before being able to generate the mutual secure cipher key. A major disadvantage of a user interactive communication system is that many important applications do not allow for an interactive protocol (e.g., electronic mail, many military and diplomatic applications). Another disadvantage of an interactive system is that they are much less efficient, and much more expensive because of the required interaction. In another system known as an identity-based signature system, the need to authenticate a user's public key does not arise because the public key consists entirely of publicly known information, encoded as such with a user's name, address, physical description, etc. See Shamir, Identity-Based Cryptosystems And Signature Schemes, CRYPTO '84, Lecture Notes in Computer Science, Volume 196, New York, N.Y.: Springer Verlag (1985). This publicly known information does not need to be authenticated and is referred to as the user's identity. However this system is a digital signature system that cannot be used as a privacy cryptosystem. Moreover, the idea of using identity-based information as part of the public key in a public key distribution system has been proposed. See Tsujii and Itoh, An ID-based Cryptosystem Based On The Discrete Logarithm Problem, IEEE J. on Selected Areas in Communications, volume 7, no. 4, May (1989); Gunther, An Identity-based Key-exchange Protocol, presented at Eurocrypt'89, Houthalen, Belgium, (1989); Koyama and Ohta, Identity-based Conference Key Distribution Systems, Proceedings CRYPTO'87, Lecture Notes in Computer Science, volume 293, New York, N.Y.: Springer Verlag (1988); and Okamoto and Tanaka, Key Distribution Based On Identification Information, IEEE J. on Selected Areas in Communications, volume 7, May (1989). In these systems, a trusted authority is used to issue users' secret keys. This solves the problem of verifying the authenticity of a certain user's public key. These systems are known in the art as identity-based public key distribution system. But a disadvantage of these approaches is that they require user interaction for the exchange of the public key. Some other disadvantages are as follows: Some of the methods require too much computation for being truly practical and are not sufficiently efficient for most applications. See Koyama and Ohta, Identity-based Conference Key Distribution Systems, Proceedings CRYPTO'87, Lecture Notes in Comp. Science, volume 293, Springer Verlag (1988) and Tsujii and Itoh, An ID-based Cryptosystem Based On The Discrete Logarithm Problem, IEEE J. on Selected Areas in Communications, volume 7, no. 4, May 1989. The Koyama and Ohta approach has been demonstrated to be insecure. The Tsujii and Itoh approach offers the potential for non-interactive user communication but requires a very large amount of computation and is insecure when too many users collaborate in order to determine other users' secret keys. In summary, the invention provides a cryptographic system which allows encrypted communication between users with a secure mutual cipher key determined without user interaction. A secret key generator for a trusted authority means in the cryptographic system comprising means for receiving publicly-known user identity ID
a that is solved for s
K The mutual secure cipher key K In operation, a transmitting user T will send a plaintext message P to a receiving user R with identity ID
K Transmitting user T's cryptographic device receives the secure mutual cipher key K In order for a receiving user R to decipher the ciphertext C, receiving user R's secure cipher key generator takes its secret key s
K which is by a completely analogous equation as for the secure mutual cipher key K
K Using the fact that K Accordingly, an object of this invention is to enable a transmitting user to communicate a message enciphered by a secure mutual cipher key determined without any previous interaction with a receiving party or a trusted authority. A feature of the present invention is that it has applications in two-way cryptographic communication, as well as one-way cryptographic communication. FIG. 1 is a block diagram of a cryptographic system having two users communicating over an insecure communication channel, a trusted authority and an enemy eavesdropper. FIG. 1 shows a cryptographic system in which user A communicates with user B over an unsecured communication channel, for example over telephone lines. The system is adapted with a trusted authority (for example, a government organization or a telephone company), which provides means discussed below for securing the integrity of the communication between users A and B against an enemy eavesdropper who is technologically capable of intercepting communication over the unsecured communication line. When the system is first setup, the trusted authority receives a system input parameter r, which is the number of secret system parameters (explained in detail below) into its parameter generator, which then generates public system output parameters base a and modulus m and secret system output parameters p Each user can register with the trusted authority by providing user identity information consisting of names, address, physical and passport identification information, and by proving their identity to the trusted authority, for example by showing a passport. (For the purpose of this discussion only 2 users A and B and one insecure communication channel connecting them are shown in FIG. 1 for the sake of simplicity.) The trusted authority receives user identity information ID In order to send securely a plaintext message P over an unsecured communication channel to another user B, user A's secure cipher key generator 1 receives as an input the identity ID In order to recover the plaintext message P, user B's secure cipher key generator 2 receives as an input the identity ID The overall cryptographic system includes the three fundamental steps: the system setup, user registration and user communication. A specific description of preferred embodiments of the invention will follow. System Setup: The overall security of the system is set up by the trusted authority, which initially receives a system input parameter r, a small positive integer number, which is the number of secret system prime factors. The trusted authority's parameter generator then generates the r secret system prime factors p Next, the trusted authority's parameter generator generates the public system parameter base a, which is a so-called primitive element of given finite fields GF(p User Registration: After the setup by the trusted authority, a user who wants to join the network (for example user A) contacts the trusted authority and identifies themself, for example with a passport. User A's is assigned an identity number ID In order to generate user secret keys, the trusted authority generates using a secret key generator a unique list of r numbers 1
0≦1
and
a An equation of the form x≡y (mod w) means that the remainders of x and y, when divided by w, are the same or, equivalently, that y-x is a multiple of w (possibly zero or a negative). The reason why user identity ID
0≦s
and
s See a standard Chinese remainder method described in Lipson, Elements Of Algebra And Algebraic Computing, Benjamin/Cummings (1981). The secret key s
a i.e., it is the discrete logarithm of the squared identity modulo m with respect to the base a. One important property of this embodiment is that the trusted authority can compute the discrete logarithm of (ID To complete the user registration, the trusted authority then provides to user A the public system parameters base a, modulus m, and its secret key s User Communication: In operation, in order for a transmitting user A to send a plaintext message P to a receiving user B with identity ID
K User A's cryptographic device 1 receives the secure cipher key K In order to decipher the ciphertext C, user B's secure cipher key generator 2 takes as inputs user A's identity ID
K which is by a completely analogous equation as for K
K The reason that K The method for generating a secure cipher key jointly shared by users A and B has the property that the generated key is the same each time the method is used. This has the consequence that two users would in each application of the system be using the same cipher key K For the purpose of analyzing the security of a cryptographic system, the enemy eavesdropper is assumed in general to have a secure key generator 3 and a conventional cryptographic device 3 available, both identical to those used by users A and B. The security of the system does hence not rely on users A and B having a computational advantage, but only on the fact that they each posses a piece of information the eavesdropper is unable to obtain or compute. The eavesdropper could in theory determine the cipher key K One of the most important aspects of the invention is that the primes p For all the above choices it is infeasible for an enemy to compute the prime factor p Moreover other significant advantages are gained by this system by allowing implicit authenticity and non-interactive generation of secure mutual cipher keys. The authenticity problem is solved by the fact that the user identity is chosen as the public key. No interaction is required by using a secure mutual cipher key that solely depends on a user secret key assigned by the trusted authority and the other communicating party's identity. Alternative Method For Identification Number Assignment: In the special case where the number r of prime factors is equal to 2, there is another way besides squaring described above that allows the trusted authority to guarantee that the identity number ID Illustrative Example: An example using numbers that are much smaller than those that would be used in a practical implementation is helpful in following the above description of the new invention. Let r=2, p Identification Protocol: The present invention can also be used to set up an identification protocol. A user can prove its identity by proving that it possesses the secret key corresponding to its identity without revealing it. For instance, assume that user A wants to prove its identity to a person B (not necessarily a user). This is achieved by repeating the following well-known protocol a sufficient number of times (for example 20 times). User A chooses a random number r and sends a number a The above description provides the best mode contemplated by the inventor. Modifications and variations are possible without departing from the spirit and scope of the invention. Patent Citations
Non-Patent Citations
Referenced by
Classifications
Legal Events
Rotate |